Articles with "secure transmission" as a keyword



Photo by hudsoncrafted from unsplash

Secure Transmission With Aid of a Helper for MIMOME Network Having Finite Alphabet Inputs

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Access"

DOI: 10.1109/access.2017.2671878

Abstract: This paper considers secure transmission with the aid of a helper for finite alphabet signals in multiple-input–multiple-output multiple antenna eavesdropper networks, where the helper transmits a jamming signal along with the confidential message sent by… read more here.

Keywords: secure transmission; helper; ergodic secrecy; secrecy rate ... See more keywords
Photo from wikipedia

Eavesdropping of Magnetic Secure Transmission Signals and Its Security Implications for a Mobile Payment Protocol

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2859447

Abstract: Magnetic secure transmission (MST) is a technology that emulates the action of swiping a magstripe card in a card reader in that it artificially generates the magnetic signal produced when a card is swiped. MST… read more here.

Keywords: magnetic secure; mobile payment; payment; secure transmission ... See more keywords
Photo by akshayspaceship from unsplash

A Secure-Transmission Maximization Scheme for SWIPT Systems Assisted by an Intelligent Reflecting Surface and Deep Learning

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3159679

Abstract: Recently, the demand for spectral and energy efficiency has significantly been increased along with new breakthroughs in programmable meta-material techniques. The integration of an intelligent reflecting surface (IRS) into simultaneous wireless information and power transfer… read more here.

Keywords: reflecting surface; swipt; intelligent reflecting; secure transmission ... See more keywords
Photo from wikipedia

Robust Resource Allocation for Lightweight Secure Transmission in Multicarrier NOMA Assisted Full Duplex IoT Networks

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3110974

Abstract: In this paper, with the aim to enhance the secure transmission and improve the utilization of spectrum resources in IoT, a multicarrier non-orthogonal multiple access (MC-NOMA) assisted full duplex (FD) network is investigated, in which… read more here.

Keywords: resource allocation; assisted full; noma assisted; secure transmission ... See more keywords
Photo by alterego_swiss from unsplash

Secure Transmission and Self-Energy Recycling With Partial Eavesdropper CSI

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Journal on Selected Areas in Communications"

DOI: 10.1109/jsac.2018.2825541

Abstract: This paper focuses on the secure transmission of wireless-powered relay systems with the imperfect eavesdropper channel state information. For efficient energy transfer and information relaying, a novel two-phase protocol is proposed, in which the relay… read more here.

Keywords: information; transmission; secure transmission; energy recycling ... See more keywords
Photo by bradencollum from unsplash

Adaptive Secure Transmission for RF-EH Untrusted Relaying with Alien Eavesdropping

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2017.2730184

Abstract: An adaptive cooperative scheme is proposed to improve the security of a wireless-powered relay network. A source node sends data to a destination node in the presence of an amplify-and-forward untrusted relay node and an… read more here.

Keywords: relay; source; adaptive secure; secure transmission ... See more keywords
Photo from wikipedia

Distributionally Robust Optimization for Secure Transmission With Assisting Jammer in MISO Downlink Networks

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2018.2886025

Abstract: This letter investigates secure transmission with imperfect channel state information (CSI) in multi-input single-output downlink wireless networks that consist of a transmitter, a desired receiver, one eavesdropper, and an assisting jammer. Specifically, only rough first-… read more here.

Keywords: secure transmission; downlink; assisting jammer; distributionally robust ... See more keywords
Photo by hajjidirir from unsplash

DeepAntiJam: Stackelberg Game-Oriented Secure Transmission via Deep Reinforcement Learning

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2022.3182001

Abstract: In this letter, we present a novel deep reinforcement learning-assisted anti-jamming transmission scheme (DeepAntiJam) to guarantee reliable and creditable transmission in the presence of one smart jammer and multiple eavesdroppers. Specifically, we formulate secure transmission… read more here.

Keywords: reinforcement learning; deep reinforcement; transmission; secure transmission ... See more keywords
Photo by hudsoncrafted from unsplash

Multicomponent Secure Transmission Based on GMFRFT With Imperfect CSI

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2022.3202647

Abstract: In this letter, a robust multi-component secure transmission scheme based on general multi-fractional Fourier transform (GMFRFT) with imperfect channel state information (CSI) is proposed and analyzed. The scheme combines signal and spatial domains for transmitted… read more here.

Keywords: gmfrft imperfect; secure transmission; imperfect csi; scheme ... See more keywords
Photo by bradencollum from unsplash

Secure Transmission in Wiretap Channels Using Full-Duplex Relay-Aided D2D Communications With Outdated CSI

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2020.2986404

Abstract: This letter examines the physical layer security of a cellular network with inband underlay relay-aided Device-to-Device (D2D) communication, considering the scenario where the channel state information is outdated. The relay node, which operates in a… read more here.

Keywords: relay aided; relay; transmission wiretap; secure transmission ... See more keywords
Photo by shapelined from unsplash

Reconfigurable Intelligent Surface Aided Non-Orthogonal Unicast-Multicast Secure Transmission

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2021.3136897

Abstract: In this letter, a reconfigurable intelligent surface (RIS) is employed to enhance the secure performance of non-orthogonal unicast-multicast (NOUM) transmissions, where the propagation environment can be manipulated to achieve communication security while maintaining the quality… read more here.

Keywords: intelligent surface; unicast multicast; non orthogonal; reconfigurable intelligent ... See more keywords